The CIA drones watching him cannot strike because he's a U.S. citizen and the Justice Department must build a case against him, a task it hasn't completed

Four U.S. officials said the American suspected terrorist is in a country that refuses U.S. military action on its soil and that has proved unable to go after him. And President Barack Obama's new policy says American suspected terrorists overseas can only be killed by the military, not the CIA, creating a policy conundrum for the White House.

Oddly, the DOJ hasn't completed its case against the targeted American, despite officials (anonymous ones) claiming the man is a "facilitator" who has been "directly responsible" for attacks on Americans overseas. Flimsier cases have floated entire prosecutions (including many, many of the FBI's homegrown terrorists). It must be the potential stripping of due process (no matter how meaningless that process has been in practice) holding the US back.

It may not even need a case. It may just need to offer sufficient justification for carrying out a death sentence without due process. That's the sort of thing Rep. Mike Rogers seems to think the US should be doing anyway. His unwavering belief that the US is a country constantly besieged by attackers leaves no room for constitutional nuances like due process. This, along with "transparency" is referred to by Rogers as "red tape."

Even as the "case" is being built, there are other concerns. As we just covered recently, the NSA aids in tracking down strike targets, but it's doing so using (no big deal, it's just) metadata, some of which is less than precise. Those who think they are targets are swapping SIM cards around as quickly as possible to thwart geolocation tracking, which ultimately means the target being killed may not be the person the NSA thinks he/she is.

But moving beyond Rogers' histrionics and the NSA's haystacks, these statements by anonymous government officials don't look like much more than further appeasement. Rules were put in place to make other countries happier and this very public hand wringing looks for all the world like the administration stage-whispering "See how very complicated this is, and how restrained we're being in response." Admittedly, stagecraft is a large part of politics, but this particular incident is notable for its overacting.

The government has killed four Americans with drone strikes since 2009, so this open-air discussion has less to do with concerns about following proper steps than it does with letting unhappy foreign nations know how seriously we're suddenly taking our targeted killing responsibilities. The limitations on drone strikes were a long time coming, and it has taken a sustained uproar over several years to get them implemented. The last time the administration spent any time considering the implications of its hands-off approach to extrajudicial killing was towards the end of Obama's first term in 2012, when there was the momentary concern that The Bad Guys (the other party) might have the same unfettered access and authority.

As much as the unnamed American might be deserving of punishment for his attacks on Americans, the administration should stick to its self-imposed rules and follow the processes it implemented. And the least it could do is follow the rules without carrying on in public, trying to conjure up some sort of sympathy for the difficult decisions it faces.

from the but-it's-just-metadata dept

Late last night, the new publication from Laura Poitras, Glenn Greenwald and Jeremy Scahill launched. It's called The Intercept, and I imagine that it's going to be a must-follow for a variety of reasons. Its first major article digs deep into the NSA's role in killing people with drones (often innocent people) based on questionable metadata. Remember how NSA defenders kept insisting that "it's just metadata" as if that was no big deal? Well, what about when that metadata is being used to kill people?

Just last week, we wrote about Rep. Mike Rogers complaining about new "red tape" that was making it more difficult to indiscriminately kill people with drones. That "red tape" is actually just a new set of guidelines designed to try to prevent more killing of innocent people with drones. This new report highlights how the US government's infatuation with drones, combined with the NSA's obsessive collection of metadata, means that drones are frequently used to kill people based on very little evidence that the people being killed are actually terrorist threats.

One noteworthy point about this article: it relies on two new sources, one named, one kept secret, backed up by Snowden documents. That is, it appears that at least one other source (in this case, a recent member of JSOC’s High Value Targeting task force -- the group that's in charge of figuring out who to capture and kill) has come forward to Greenwald and others, calling foul on what the US government is doing. This person was privy to how targets are selected, and it's pretty scary how little info they're going on. The fact that the NSA was heavily involved in picking targets was revealed a while back, but this person explains how much those choosing targets rely on bad metadata from the NSA to kill people -- often revealed later to be totally innocent.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

The guy also points out that the metadata is often somewhat questionable in itself:

What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

“People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.”

You would think that someone like Rep. Rogers would be happy that we were trying to improve our targeting and to stop killing innocent people, but apparently making sure the people we target are actually guilty is just too much "red tape." But it hasn't stopped these killings. The source in the article notes that the "overwhelming majority" of the strikes they're doing these days are based almost entirely on the NSA's signals intelligence.

The report also reveals that the NSA has a program in which the drone itself has what's basically its own phone cell attached to the drone, in order to better target a particular phone (note: not person, but phone) when dropping a bomb. The report also reveals another program, this one from the CIA, called SHENANIGANS (really), that maps out WiFi networks from the sky and tries to suck up any data it can. When this program was used in Yemen, the mission was called (again, no joke) VICTORYDANCE.

There's a lot more in the article, which is well worth reading. It's good to see more sources who are uncomfortable with what the NSA, CIA and others are doing getting in touch with Greenwald and others. It's also worth noting that this guy claims he tried to raise these issues through the "proper channels" and was rebuffed.

from the and-the-hits-keep-coming dept

There's so much information that's coming out of last night's Washington Post bombshell that just continues to yield incredible information about what defenders of these programs have been saying as compared to what's actually happening. Here's another one. One of the documents released with the report, via Ed Snowden, shows that NSA agents were directly told to give their overseers as little information as possible. The document explains to agents the process for justifying why they were requesting targeting (i.e., a more detailed look concerning an individual or group -- not just at that person's communications, but potentially anyone even remotely connected to them), and makes it clear that they are to give the bare minimum necessary to fulfill their reporting requirements, but not even the slightest bit beyond that. In fact, they're told to give a single short sentence, and to make sure it includes no "extraneous information."

The basic premise of this process is to memorialize why you the analyst have requested targeting. This rationale will be provided to our external FISA Amendment Act (FAA) overseers, the Department of Justice and Office of the Director of National Intelligence, for all FAA targeting.

While we do want to provide our FAA overseers with the information they need, we DO NOT want to give them any extraneous information.... This rationale can be no longer than one short sentence.

The document goes on to list a variety of "example" rationale sentences, all pretty short and sweet, which basically demonstrate to NSA agents how to remove any pertinent information for oversight, while still giving a "reason" for targeting someone. It's a lesson in stripping out information and, as the Washington Post notes, replacing it with "generic" info that will pass muster with the folks supposedly in charge of oversight. As an aside, while parts of them are redacted, there are a few "fake" names given, including "Mohammad Badguy" and "Muhammad Fake Name." No profiling there.

Either way, this once again suggests that the "oversight" going on here is something of a joke. Analysts are directly being told to be careful not to explain very much at all, giving the briefest ("one short sentence, no extraneous information") basis for getting access to all sorts of information concerning a "target" -- which might include a variety of communications and metadata concerning a huge number of people very, very, very loosely connected with that target. It certainly suggests that this idea of "oversight" is pretty laughable. Concoct a one sentence "rationale" that sounds vaguely plausible, and it appears that no one's going to ask any questions at all.

from the wow dept

Glenn Greenwald had promised that there were more incredible leaks concerning the NSA to come, and here's the first big one. Greenwald has revealed the NSA's rules that show the procedures for targeting non-US persons, and also how they "minimize" data collected on US persons when dealing with the "bulk" data records collection they do, such as with all of the data around every phone call made. These are two key parts to the NSA's insistence that they're staying within the law and not spying on people in the US. The details here, however, suggest a very different story. The FISA court has signed off on these rules that appear to grant incredibly wide latitude for the NSA to make use of data, rather than really "minimize" its usage. While President Obama and others have insisted that the rules make sure that the NSA really isn't collecting data on Americans, the reality shows that FISC approved rules let the NSA:

Keep data that could potentially contain details of US persons for up to five years;

Retain and make use of "inadvertently acquired" domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted, or are believed to contain any information relevant to cybersecurity;

Access the content of communications gathered from "U.S. based machine[s]" or phone numbers in order to establish if targets are located in the US, for the purposes of ceasing further surveillance.

The report from Greenwald also reveals that orders he has seen from the FISA court concerning broad data collection do not appear to include details or explanations, other than your basic rubber stamp that FISC says it's okay.

One such warrant seen by the Guardian shows that they do not contain detailed legal rulings or explanation. Instead, the one-paragraph order, signed by a Fisa court judge in 2010, declares that the procedures submitted by the attorney general on behalf of the NSA are consistent with US law and the fourth amendment.

But since those procedures have now been leaked, we can see that they're not very carefully targeted at all. If the NSA doesn't know where someone is located, it can assume the person is foreign:

In the absence of specific information regarding whether a target is a United States person, a person reasonably believed to be located outside the United States or whose location is not known will be presumed to be a non-United States person unless such person can be positively identified as a United States person.

That part about how the NSA can still keep data on US persons if they believe the data contains "evidence of a crime," "technical data base information" or "information pertaining to a threat of serious harm to life or property" obviously give the NSA incredible powers to -- contrary to what they've stated publicly -- retain all sorts of info on Americans.

Once we and others have had a chance to dig deeper through these, I'm sure we'll have more to say, but for now, it appears that, once again, the NSA and its defenders were less than fully forthcoming about how the NSA uses the data it collects and how it makes sure that Americans aren't targeted.